Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: White House
After nearly two years and $86 million worth of noisy and disruptive construction, the West Wing has emerged from its visual seclusion remarkably unchanged.
The administration is considering using an executive order to promote and encourage critical infrastructure providers to improve their cybersecurity. The draft EO, which Federal News Radio obtained details of, mirrors major sections of the second version of the Lieberman- Collins comprehensive cyber bill.
U.S. Chief Technology Officer Todd Park is naming 18 innovation fellows today to work on five "high-impact" federal IT projects.
Office of Information and Regulatory Affairs Administrator Cass Sunstein is returning to Harvard, where he was the Felix Frankfurter Professor of Law before coming to the Obama administration in 2009.
The White House is updating its 2010 trade secret theft and counterfeit product prevention strategy. The new plan will incorporate public input, which the administration is currently soliciting from stakeholders.
Prosecutors declined Tuesday to file criminal charges against former U.S. Commerce Secretary John Bryson, saying a seizure caused a bizarre series of traffic collisions that led to his resignation.
The White House has threatened to veto two key House spending bills because of severe spending cuts at some agencies as well as federal pay and workforce provisions. In statements of administration policy, the Office of Management and Budget said appropriations bills for both Financial Services and General Government and the Defense Department stray from previously agreed to budgetary caps
The Homeland Security Department is taking a two-pronged approach to protecting the federal supply chain. The first addresses the DHS mission cargo crossing into the U.S. The second is an interagency effort to ensure the government is working together on investigations. DHS said seizures of counterfeit goods at the border increased by 20 percent in 2011.
The White House, Congress, DoD and many others are trying to stem the tide of counterfeit products and software with malicious code from entering federal systems. The administration soon will release recommendations for how all agencies and vendors can improve the security of their products. DoD issued a memo in March requiring changes to how services protect their supply chains.
Tags: technology , cybersecurity , industry , Victoria Espinel , DoD , Jon Boyens , NIST , Sandy Boyson , University of Maryland , Supply chain management , Supply chain risks , Inside the Worlds Biggest Buyer , Jason Miller
Heidi Avery is deputy assistant to the President for homeland security, on the National Security Staff.